AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C
-
Cisco Unified Contact Center Express (Cisco Unified CCX) server contains both a directory traversal vulnerability and a script injection vulnerability in the administration pages of the Customer Response Solutions (CRS) and Cisco Unified IP Interactive Voice Response (Cisco Unified IP IVR) products. Exploitation of these vulnerabilities could result in a denial of service condition, information disclosure, or a privilege escalation attack.
Cisco has released free software updates that address these two vulnerabilities in the latest version of Cisco Unified CCX software.
This advisory is posted at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20090715-uccx.
-
The Cisco Unified Contact Center Express (Cisco Unified CCX) is a single-server, integrated "contact center in a box" for use in deployments with up to 300 agents.
Vulnerable Products
All versions of Cisco Unified CCX server running the following software may be affected by these vulnerabilities, to include:
-
Cisco Customer Response Solution (CRS) versions 3.x, 4.x, 5.x, 6.x,
and 7.x
-
Cisco Unified IP Interactive Voice Response (Cisco Unified IP IVR)
versions 3.x, 4.x, 5.x, 6.x, and 7.x
-
Cisco Unified CCX 4.x, 5.x, 6.x, and 7.x
-
Cisco Unified IP Contact Center Express versions 3.x, 5.x, 6.x, and
7.x
-
Cisco Customer Response Applications versions 3.x
-
Cisco IP Queue Manager (IP QM) versions 3.x
Products Confirmed Not Vulnerable
No other Cisco products are currently known to be affected by these vulnerabilities.
-
Cisco Customer Response Solution (CRS) versions 3.x, 4.x, 5.x, 6.x,
and 7.x
-
Cisco Unified Contact Center Express (Cisco Unified CCX) servers may be affected by both a directory traversal vulnerability and a script injection vulnerability
The directory traversal vulnerability may allow authenticated users to view, modify, or delete any file on the server through the Customer Response Solutions (CRS) Administration interface. This vulnerability is documented in Cisco Bug ID CSCsw76644 ( registered customers only) and has been assigned Common Vulnerability and Exposures (CVE) ID CVE-2009-2047.
The script injection vulnerability may allow authenticated users to enter JavaScript into the Cisco Unified CCX database. The stored script could be executed in the browser of the next authenticated user. This vulnerability is documented in Cisco Bug ID CSCsw76649 ( registered customers only) and has been assigned CVE ID CVE-2009-2048.
-
There are no workarounds for these vulnerabilities.
The script injection attacks that are described in this advisory are a specific classification of stored cross-site scripting attacks. A description and mitigation technique can be found in the applied mitigation bulletin available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20060922-understanding-xss
These vulnerabilities can be detected and mitigated with IDS signatures 3216-0 and 19001-0.
-
The fixes for these vulnerabilities are included in CRS version 7.0(1) SR3 and are available as a hotfix for customers running versions 5.x and 6.x. The hotfixes are crs5.0.2sr2es09 and crs6.0.1sr1es05.
The latest version of Cisco Unified Contact Center Express is available at the following link: https://sec.cloudapps.cisco.com/support/downloads/go/ImageList.x?relVer=7.0%281%29_SR2&mdfid=270569179&sftType=Cisco+Customer+Response+Solution+Software+Releases&optPlat=&nodecount=11&edesignator=null&modelName=Cisco+Unified+Contact+Center+Express&treeMdfId=2788752.
Information about how to obtain the hotfixes can be found in the release notes enclosures of the bugs at: CSCsw76644 ( registered customers only) and CSCsw76649 ( registered customers only) .
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance.
-
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities described in this advisory.
These vulnerabilities were reported to Cisco by National Australia Bank's Security Assurance team.
Cisco would like to thank the National Australia Bank's Security Assurance team for the discovery and reporting of these vulnerabilities.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Revision 1.1
2009-July-16
Changed fixed software version
Revision 1.0
2009-July-15
Initial public release
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.